Back to Results
First PageMeta Content
Botnets / Spamming / Cyberwarfare / Computer security / Storm botnet / Mariposa botnet / Defence Intelligence / Malware / Rustock botnet / Computing / Computer network security / Multi-agent systems


Insights from the Analysis of the Mariposa Botnet Prosenjit Sinha, Amine Boukhtouta, Victor Heber Belarde, Mourad Debbabi NCFTA Canada & the Computer Security Laboratory
Add to Reading List

Document Date: 2010-09-10 20:48:10


Open Document

File Size: 444,92 KB

Share Result on Facebook

City

Washington / DC / /

Company

LimeWire / Arbor Networks / Computer Science Laboratory / Palo Alto Networks / SRI International / Mariposa / Butterfly Network Solutions / VMware / Intel / /

Country

United States / Canada / /

Event

Natural Disaster / /

Facility

Computer Security Laboratory Concordia University / /

IndustryTerm

http /

OperatingSystem

Linux / Windows XP / Microsoft Windows / Windows NT / /

Organization

Univ. of Washington / Defence Intelligence on the Analysis of Mariposa / USENIX Association / Defence Intelligence / National CyberForensics Training Alliance / Computer Security Laboratory Concordia University Montreal / /

Person

Michael Stoppelman / Lynne Perrault / Phillip Porras / Vinod Yegneswaran / Thorsten Holz / David Dittrich / Ken Chiang / Sven Dietrich / Moritz Steiner / Brian Krebs / Frederic Dahl / Ernst Biersack / Mourad Debbabi / Neil Daswani / Levi Lloyd / Felix Freiling / Victor Heber Belarde / Hassen Sadi / Jose Nazario / /

Position

mediator / MSN messenger / /

Product

D. Code Injection / CreateFile / Direct Code Injection / InternetReadFile / WsaStartup / HttpSendRequest / HttpOpenRequest / Dll injection / SysAnalyzer / InternetCloseHandle / WaitForSingleObject / /

ProgrammingLanguage

php / /

Technology

RC4 algorithm / Overnet protocol / UDP protocol / prominent botnet technologies / beaconing protocol / key exchange protocol / 1 Contemporary processors / peer-to-peer / Linux / upper layer protocols / API / P2P / instant messaging / initialization protocol / operating system / UDP / operating systems / TCP/IP / little-endian / Encryption / encryption/decryption algorithm / action protocol / employed technologies / three protocols / DNS / communication protocol / HTTP / underlying communication protocols / P2P technologies / virtual memory / Communication Protocols / sandbox technology / encryption key generation algorithm / flash / at uncovering the employed technologies / /

URL

http /

SocialTag